Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2020-5534

Publication date:
21/02/2020
Aterm WG2600HS firmware Ver1.3.2 and earlier allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via unspecified vectors.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2020

CVE-2020-5525

Publication date:
21/02/2020
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2020

CVE-2020-5524

Publication date:
21/02/2020
Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2020

CVE-2016-4606

Publication date:
21/02/2020
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
21/02/2020

CVE-2014-7914

Publication date:
21/02/2020
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2020

CVE-2020-5243

Publication date:
21/02/2020
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. This has been patched in uap-core 0.7.3.
Severity CVSS v4.0: Pending analysis
Last modification:
08/02/2024

CVE-2020-5242

Publication date:
20/02/2020
openHAB before 2.5.2 allow a remote attacker to use REST calls to install the EXEC binding or EXEC transformation service and execute arbitrary commands on the system with the privileges of the user running openHAB. Starting with version 2.5.2 all commands need to be whitelisted in a local file which cannot be changed via REST calls.
Severity CVSS v4.0: Pending analysis
Last modification:
26/02/2020

CVE-2020-8601

Publication date:
20/02/2020
Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory.
Severity CVSS v4.0: Pending analysis
Last modification:
25/02/2020

CVE-2019-14688

Publication date:
20/02/2020
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.
Severity CVSS v4.0: Pending analysis
Last modification:
04/03/2020

CVE-2019-19694

Publication date:
20/02/2020
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the entire product completely..
Severity CVSS v4.0: Pending analysis
Last modification:
21/07/2021

CVE-2020-8960

Publication date:
20/02/2020
Western Digital mycloud.com before Web Version 2.2.0-134 allows XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
01/01/2022

CVE-2020-8990

Publication date:
20/02/2020
Western Digital My Cloud Home before 3.6.0 and ibi before 3.6.0 allow Session Fixation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/02/2020